Redrawing the Cyber Defense Frontier

50 %
50 %
Information about Redrawing the Cyber Defense Frontier
Business & Mgmt

Published on February 5, 2014

Author: DrJoeHage

Source: slideshare.net

Description

Information security is not about reacting to attacks. Information security is about analyzing patterns and predicting potential threats by expanding the defense perimeter beyond the traditional borders.

Redrawing the Cyber Defense Frontier Dr. Joe Hage © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 1

Information Security Challenges – 1/2 • Senior management, often times, disengaged and apathetic toward information security • Information security initiatives are sometimes checkboxes for regulatory compliance purposes • Information security tends to be considered as an impediment to business progress and agility • Employees lacking information security awareness © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 2

Information Security Challenges – 2/2 • Information security is often an afterthought in software development life cycle (SDLC) • Industrialization and nationalization of hackers • Loss of control over accessibility and usage as everyone keeps bringing their own portable devices to work • The mushrooming cloud is eliminating boundaries and security perimeters © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 3

Facts: The Mushrooming Cloud • Infrastructure-as-a-Service (IaaS), e.g. Amazon EC2 • Platform-as-a-service (PaaS), tools and services used to develop and deploy applications, e.g. Google App Engine • Software-as-a-service (SaaS) such as Salesforce.com, Microsoft Office 365, and Google Docs • Storage-as-a-service (SaaS), file storage and sharing services like Dropbox and SkyDrive • “The Internet of Things” – Billions of connected devices – 25 Billion devices by 2015 (Source: Cisco) – 50 Billion devices by 2020 (Source: Cisco, Forbes) © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 4

Facts: Everyone is Vulnerable • Traditional defenses are inadequate – – – – – – – Anti-Malware Anti-Virus Anti-Spyware Anti-Phishing Firewalls and Filters Intrusion Detection Data Loss Prevention • Every device, user, application, or web page are potential threats forcing enterprises to limit usage and restrict access © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 5

Solution: Redraw Cyber Defense Frontier • Collect and analyze data and patterns to set baseline • Monitor and detect anomalies • Predictive Failure Analysis – – – – – – – Content System Transactions User Activities User Behaviors (which may vary depending on device used) Application Behaviors Data Patterns Network Traffic © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 6

Dr. Joe Hage’s Contact Info • • • • • • • E-mail: DR@JOE.ME Skype: joe_hage Web: www.joe.me LinkedIn: http://www.linkedin.com/in/joehage Twitter: http://twitter.com/DrJoeHage Facebook: http://facebook.com/DrJoeHage Amazon: http://www.amazon.com/author/joe-hage © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 7

Add a comment

Related presentations

Canvas Prints at Affordable Prices make you smile.Visit http://www.shopcanvasprint...

30 Días en Bici en Gijón organiza un recorrido por los comercios históricos de la ...

Con el fin de conocer mejor el rol que juega internet en el proceso de compra en E...

With three established projects across the country and seven more in the pipeline,...

Retailing is not a rocket science, neither it's walk-in-the-park. In this presenta...

What is research??

What is research??

April 2, 2014

Explanatory definitions of research in depth...

Related pages

Everything is moving to the wire and so is war & crime ...

The internet is redrawing ... The internet is redrawing boundariesCyberspace is the new frontier ... The most disturbing statistic on cyber defense is ...
Read more

Dr. Joe Hage (@DrJoeHage) | Twitter

The latest Tweets from Dr. Joe Hage (@DrJoeHage). Dr. Joe Hage is a leadership and business expert with more than 34 years of experience in building ...
Read more

Amazon.co.uk: Joe Hage: Books, Biogs, Audiobooks, Discussions

Visit Amazon.co.uk's Joe Hage Page and shop for all Joe Hage books. Check out pictures, bibliography, biography and community discussions about Joe Hage
Read more

The return of “great power politics” - Stabroek News

* New emerging powers reshaping strategic landscape * Currency, commodity rivalries pose new dangers * Cyber warfare, espionage new fields of battle * Smal
Read more

Plans for redrawing the Middle East: The project for a ...

An Institute for Global Energy Research ... Plans for redrawing the Middle East: The project for a “New Middle East”
Read more

Defense industry news, analysis and commentary

... Russian supply trucks are quietly redrawing the map ... probing the US air defense ... makes Gen. Philip Breedlove distinctly nervous ...
Read more

Middle East: Redrawing the Map « ConspiracyAnalyst.org

... Redrawing the Map. Posted on ... new state on our southern frontier in the north of Syria,” Erdogan was quoted by ... Is Her Last Line of Defense ...
Read more